This eBook will provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations.

Even veteran IT pros don’t fully understand the authentication technologies used by Windows and other operating systems. With their deep knowledge of authentication protocols such as NTLM and Kerberos, hackers can steal your users' credentials and then secretly take your most valuable data. In this guide, you’ll learn the techniques hackers use to subvert authentication controls.

How does the bitcoin protocol work?
A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be twenty-one million bitcoins to be produced by the miners. These bitcoins will then be subdivided into smaller bits. The smallest bit is called ‘satoshi’ named after the bitcoin founder and the divisible amount is one hundred millionth of a bitcoin.
Learn more here!

Edward Snowden, the former NSA contractor, perpetrated the greatest assault on American intelligence in US history. Yet his select brotherhood of adversarial journalists, radical activists and anarchist hackers have remained in the shadows. This book brings them to light and challenges their war for absolute encryption even as they demand radical transparency of liberal democracies.